Robert Haas

Affiliations:
  • IBM Research, Zurich, Switzerland


According to our database1, Robert Haas authored at least 32 papers between 2000 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
Brain-inspired Computing - Introduction to the Special Theme.
ERCIM News, 2021

2015
Seamlessly integrating disk and tape in a multi-tiered distributed file system.
Proceedings of the 31st IEEE International Conference on Data Engineering, 2015

2014
Software defined just-in-time caching in an enterprise storage system.
IBM J. Res. Dev., 2014

GPFS-based implementation of a hyperconverged system for software defined infrastructure.
IBM J. Res. Dev., 2014

Efficient and agile storage management in software defined environments.
IBM J. Res. Dev., 2014

2012
Reliability of Data Storage Systems under Network Rebuild Bandwidth Constraints.
Proceedings of the 20th IEEE International Symposium on Modeling, 2012

Scheduling in Flash-Based Solid-State Drives - Performance Modeling and Optimization.
Proceedings of the 20th IEEE International Symposium on Modeling, 2012

Robust data sharing with key-value stores.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks, 2012

2011
Disk Scrubbing Versus Intradisk Redundancy for RAID Storage Systems.
ACM Trans. Storage, 2011

Robust data sharing with key-value stores.
Proceedings of the 30th Annual ACM Symposium on Principles of Distributed Computing, 2011

A Comparison of Secure Multi-Tenancy Architectures for Filesystem Storage Clouds.
Proceedings of the Middleware 2011, 2011

Container Marking: Combining Data Placement, Garbage Collection and Wear Levelling for Flash.
Proceedings of the MASCOTS 2011, 2011

2010
Trends in Storage Technologies.
IEEE Data Eng. Bull., 2010

Effect of Replica Placement on the Reliability of Large-Scale Data Storage Systems.
Proceedings of the MASCOTS 2010, 2010

Design and Implementation of a Key-Lifecycle Management System.
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010

2009
Write amplification analysis in flash-based solid state drives.
Proceedings of of SYSTOR 2009: The Israeli Experimental Systems Conference 2009, 2009

2008
Towards a resource management and service deployment framework.
Int. J. Netw. Manag., 2008

Towards a service-enabled distributed router architecture.
IET Circuits Devices Syst., 2008

Disk scrubbing versus intra-disk redundancy for high-reliability raid storage systems.
Proceedings of the 2008 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, 2008

2006
Chordless paths through three vertices.
Theor. Comput. Sci., 2006

2005
A Web Service- and ForCES-Based Programmable Router Architecture.
Proceedings of the Active and Programmable Networks, 2005

A Web-Services Based Architecture for Dynamic-Service Deployment.
Proceedings of the Active and Programmable Networks, 2005

Applying a Web-Service-Based Model to Dynamic Service-Deployment.
Proceedings of the 2005 International Conference on Computational Intelligence for Modelling Control and Automation (CIMCA 2005), 2005

2003
Service deployment in programmable networks.
PhD thesis, 2003

Creating advanced functions on network processors: experience and perspectives.
IEEE Netw., 2003

Autonomic service deployment in networks.
IBM Syst. J., 2003

2001
A hierarchical mechanism for the scalable deployment of services over large programmable and heterogeneous networks.
Proceedings of the IEEE International Conference on Communications, 2001

Cost and Quality-of-Service-aware Network Service Deployment.
Proceedings of the Tagungsband der GI/OCG-Jahrestagung - 31. Jahrestagung der Gesellschaft für Informatik, Wirtschaft und Wissenschaft in der Network Economy, 2001

Distributed Service Deployment over Programmable Networks.
Proceedings of the Operations & Management, 2001

2000
OSPF over ATM and Proxy-PAR.
RFC, May, 2000

PNNI Augmented Routing (PAR) and Proxy-PAR.
Comput. Networks, 2000

WANTED: a theft-deterrent solution for the pervasive computing world.
Proceedings of the Proceedings Ninth International Conference on Computer Communications and Networks, 2000


  Loading...